Emily Lawson - Tech Research Online https://techresearchonline.com/author/elawson/ Knowledge Base for IT Pros Mon, 06 May 2024 15:27:27 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.5 https://techresearchonline.com/wp-content/uploads/2019/09/full-black-d_favicon-70-70.png Emily Lawson - Tech Research Online https://techresearchonline.com/author/elawson/ 32 32 Smart Rings: The Future of Wearables? https://techresearchonline.com/blog/smart-rings-the-future-of-wearables/ https://techresearchonline.com/blog/smart-rings-the-future-of-wearables/#respond Thu, 25 Apr 2024 14:13:47 +0000 https://techresearchonline.com/?p=799017 For over a decade now, wearable technology has advanced significantly with fitness trackers, smartwatches, and augmented reality glasses becoming extremely popular. Smart rings are poised to take wearable devices a notch higher. Though much smaller than other wearables, digital rings are increasingly changing the way people interact with technology. They offer advanced solutions for lifestyle enhancement and provide users an unobstructive way to track health metrics and access information without the need to carry bulky devices. Digital rings come with a stylish appearance that easily makes them the preferred option for tech-savvy consumers. These aspects place wearable technology rings at the top of wearable technology market innovation according to a MarkWide Research Report. In this article, we delve deeper into what digital rings can do and the benefits they offer users. What are Smart Rings? Smart rings are wearable electronic devices that are fitted with mobile components such as NFC chips and sensors. These stylish but compact wearables are worn on the finger and are capable of performing electronic tasks like receiving notifications, tracking health metrics, and making contactless financial transactions. The best smart rings feature multiple technologies including: 1. Sensors This technology enables wearable technology rings to track varying …

The post Smart Rings: The Future of Wearables? appeared first on Tech Research Online.

]]>
For over a decade now, wearable technology has advanced significantly with fitness trackers, smartwatches, and augmented reality glasses becoming extremely popular. Smart rings are poised to take wearable devices a notch higher. Though much smaller than other wearables, digital rings are increasingly changing the way people interact with technology. They offer advanced solutions for lifestyle enhancement and provide users an unobstructive way to track health metrics and access information without the need to carry bulky devices.
Digital rings come with a stylish appearance that easily makes them the preferred option for tech-savvy consumers. These aspects place wearable technology rings at the top of wearable technology market innovation according to a MarkWide Research Report. In this article, we delve deeper into what digital rings can do and the benefits they offer users.

What are Smart Rings?

Smart rings are wearable electronic devices that are fitted with mobile components such as NFC chips and sensors. These stylish but compact wearables are worn on the finger and are capable of performing electronic tasks like receiving notifications, tracking health metrics, and making contactless financial transactions. The best smart rings feature multiple technologies including:

1. Sensors

This technology enables wearable technology rings to track varying parameters. Some of the sensors that are fitted in digital rings include optical or infrared sensors to monitor pulse or heart beat, gyroscope sensors that detect balance, 3-axis accelerometer sensors to track movement and sleep, and EDA sensors to track cognition, emotions, and feelings. Other sensors that come with smart rings for health include SpO2 which monitors oxygen levels in the blood, NTC thermistor which tracks body temperature, and glucose sensors which monitor blood sugar levels.

2. Near Field Communication (NFC)

NFC refers to wireless connections that utilize magnetic field induction to enable communication between devices that are located in close range. NFC technology works effectively with common applications in laptops, smartphones, access cards, digital wallets, transport cards, point-of-sale terminals, and many others.

3. Bluetooth

This technology syncs the data that’s collected by sensors, allowing smart ring companies to analyze and generate user-friendly reports and personalized recommendations to users.

What Do Smart Rings Do?

Digital rings are used for different applications. Health and fitness are the most common applications in the market with Apple smart rings set to lead in monitoring health metrics while Oura smart rings and Samsung smart rings are perfect for tracking daily activities and nightly rest. Other practical smart ring capabilities include:

1. Contactless Payments

Digital rings like K Ring and McLEAR are already paving the way for contactless payment systems. Rings with these capabilities allow users to tap and make transactions of amounts that don’t exceed MasterCard and Visa global contactless payment terminals. Countries such as the Netherlands, the U.K., France, Japan, Australia, and Russia already have banks that allow smart ring contactless payments for debit and credit payments via activated MasterCard and Visa payment terminals.

2. Smart Key

Digital rings that are fitted with optical sensors can replace conventional keys or access badges or cards by working as smart keys that open homes, offices, and cars. These capabilities improve security systems as taking the ring off the finger halts access and ensures that no one can access your home, office, or the car you connect to the smart ring. Tesla smart rings are great examples of the convergence between smart and digital rings. The rings allow users to lock, start, and unlock a range of Tesla models including Model Y, Model 3, and Model S 2021.

3. Transit Pass

Various NFC smart rings come with tap-to-pay card readers that passengers can use to access transit gates, allowing them to serve as tickets or travel passes in public transportation. The rings work like stored-value cards, holding monetary value and making it readily available during travel without requiring third-parties from network connections or credit/debit accounts. A good example is the K Ring that provides transit passes for most rail services in London as well as Transport for London services.

4. Device Control

Wearable digital rings allow users to control devices like smartphones remotely. Users can improve their productivity and reduce screen time by using them to receive messages, control music, get call notifications, and set alarms remotely.

What are the Benefits of Wearing a Smart Ring?

In addition to their tracking capabilities, wearable technology rings offer users a range of benefits that include:

1. Gesture Control Capabilities

Digital rings come with tiny sensors that support gesture control. This allows users to interact with other devices, including smart home appliances by waving their hands. This feature enhances accessibility to technology and supports home automation.

2. Better Privacy and Safety

Although wearable devices function the same way, digital rings have an edge when it comes to privacy. The absence of screens means that your information remains inaccessible to those around you. Wearable technology rings also come with SOS features or panic buttons that can alert emergency services or predefined contacts when a user is in distress. In critical situations, these features can save lives.

3. Less Cumbersome

Digital rings are more comfortable to wear because of their lightweight and compact design. They provide a seamless and intuitive experience to users who prefer to use them for fitness tracking and contactless payments.

4. Longer Battery Life

Smart wearable rings have no screens. This reduces their power consumption significantly compared to other wearable devices like fitness bands and smartwatches. Majority of digital rings have a battery life of 3 to 7 days compared to fitness bands and smartwatches whose batteries last for 1 to 2 days.

5. Valuable Jewelry Pieces

Smart rings are both technology and jewelry pieces. When you get one, you wear it on your finger everyday. There are varying ring styles to choose from, and you can opt for a minimalist, sleek, or a more noticeable design. Whatever style you go for, the aesthetics that come with wearable rings make them valuable jewelry pieces that enhance your look.

Future Outlook

With the rising demand for discreet and convenient wearables, the future of smart rings looks promising. These innovative wearables blend fashion, technology, health, and finance. There’s no doubt that moving into the future, the powerful features they offer will inevitably shape our interaction with technology.

The post Smart Rings: The Future of Wearables? appeared first on Tech Research Online.

]]>
https://techresearchonline.com/blog/smart-rings-the-future-of-wearables/feed/ 0
How to Secure Your Cloud Native Applications in 2024 https://techresearchonline.com/blog/cloud-native-applications/ https://techresearchonline.com/blog/cloud-native-applications/#respond Wed, 03 Apr 2024 12:50:13 +0000 https://techresearchonline.com/?p=769004 In a world where the technology landscape is constantly changing, the cloud-native concept has gained traction. Although mostly associated with migrating data to the cloud, cloud-native is also about leveraging cloud infrastructure to increase agility, drive digital transformation, and add value to businesses. It involves the use of open-source technologies to develop and run scalable cloud-native applications. However, organizations can only reap maximum benefits from this technology if they secure their cloud applications. In this article, we discuss the security of cloud-native applications. We explain their features and show you how you can secure your organization’s cloud-native ecosystem in 2024. What is a Cloud-Native Application? Cloud-native applications are software applications that are built to run in cloud computing environments. The cloud-native approach to software development involves breaking applications into small, manageable components that are designed and deployed as independent microservices. Cloud-native application architecture allows developers to leverage dynamic cloud capabilities, including those relating to resource allocation. Since these applications are built based on DevOps practices that automate the testing, development, and deployment process, they can scale automatically depending on demand. They are capable of recovering from failures and maintaining service without manual intervention. Three things characterize cloud-native apps, which are: …

The post How to Secure Your Cloud Native Applications in 2024 appeared first on Tech Research Online.

]]>
In a world where the technology landscape is constantly changing, the cloud-native concept has gained traction. Although mostly associated with migrating data to the cloud, cloud-native is also about leveraging cloud infrastructure to increase agility, drive digital transformation, and add value to businesses. It involves the use of open-source technologies to develop and run scalable cloud-native applications.
However, organizations can only reap maximum benefits from this technology if they secure their cloud applications. In this article, we discuss the security of cloud-native applications. We explain their features and show you how you can secure your organization’s cloud-native ecosystem in 2024.

What is a Cloud-Native Application?

Cloud-native applications are software applications that are built to run in cloud computing environments. The cloud-native approach to software development involves breaking applications into small, manageable components that are designed and deployed as independent microservices. Cloud-native application architecture allows developers to leverage dynamic cloud capabilities, including those relating to resource allocation.
Since these applications are built based on DevOps practices that automate the testing, development, and deployment process, they can scale automatically depending on demand. They are capable of recovering from failures and maintaining service without manual intervention. Three things characterize cloud-native apps, which are:
  • DevOps Principles: Cloud-native apps leverage DevOps practices that emphasize automation and collaboration between operation and development teams.
  • Containerization: Cloud-native development involves the use of containers like Docker. Container orchestration tools like Kubernetes support the management and scaling of these containers. The containers condense the applications and their dependencies for consistency across varying environments.
  • Microservices Design: The design of cloud-native apps utilizes a microservice architecture that involves dividing the application into smaller, independent services that connect through APIs. This facilitates uninterrupted delivery and boosts agility.

8 Ways to Ensure Cloud-Native Application Security

Cloud security is among the main challenges businesses that utilize cloud-native environments experience. To address this challenge, businesses should apply holistic strategies, which include taking the following actions:

1. Prioritize Microservices Security

Microservices security in the overall security of cloud-native applications. This involves addressing unique challenges within their architecture. Important actions that your company can take to ensure microservices security include implementing a service mesh to keep communication between microservices secure. Additionally, conduct logging and monitoring activities from a central location to detect anomalies quickly and improve microservice interaction visibility. Leverage API gateways to secure and control external access to your microservices.

2. Embrace Best Practices in Container Security

Implement container security best practices throughout the container life cycle to secure your containers. This involves observing image, runtime, and orchestration security. Image security involves updating your images regularly, scanning them for vulnerabilities, and using official images. Orchestration security involves securing platforms like Kubernetes by observing network policies and configuring role-based access control. Runtime security involves employing runtime protection practices to detect and address threats promptly during container execution.

3. Scan the Continuous Integration, Continuous Delivery (CI/CD) Pipeline

Ensuring that the entire CI/CD pipeline is secure is critical in identifying and fixing security vulnerabilities early in the cloud-native app development process. This process involves monitoring the CI/CD pipeline continuously to detect and promptly respond to security threats. It includes scanning container images regularly to ensure that deployment is limited to secure images. It also involves analyzing static codes to identify and address vulnerability, misconfiguration, or insensitive data issues that may be present in the codebase.

4. Implement Proper Identity and Access Management (IAM)

In cloud-native environments, proper identity and access management are critical. Some practices that will ensure robust security include the implementation of RBAC to ensure permissions are granted based on roles, enforcement of multi-factor authentication, and automation of user provisioning and de-provisioning for prompt access revocation when the need arises.

5. Adopt a Zero-Trust Security Approach

The zero-trust approach to security holds that by default, no entity, internal or external to the organization is to be trusted. Embracing this approach enables you to mitigate the risks that are posed by dynamic infrastructure. It ensures that your business sets up a robust security system, that includes verifying the identity of each device and user who attempts to access its resources from any location.

6. Secure Your APIs

The security of APIs is critical in preventing data breaches and unauthorized access. APIs are the main communication channel between cloud-native apps and microservices. Some practical measures that your company can take to secure cloud-native apps include applying strong authentication and enforcing proper controls in authorization, implementing rate limitations to prevent abuse, and managing API supply. Passively scan APIs to detect misconfigurations, weaknesses, and other vulnerabilities. You should also encrypt data during transit.

7. Monitor and Respond to Security Incidents Promptly

Monitoring cloud-native app environments regularly allows you to identify security incidents and respond to them in real-time. Some practical ways of doing this include aggregating logs from different sources for analysis centrally, and implementing a Security Information and Event Management (SIEM) system to detect and respond to threats. Consider developing an incident response plan to enable you to respond to security incidents swiftly and effectively.

8. Audit Your Security Controls Periodically

Another way to secure cloud-native applications is to comply with industry regulations and conduct periodic audits to determine the effectiveness of your company’s security controls. This means documenting security policies, compliance measures, and procedures, checking compliance gaps in security controls, and automating compliance checks to ensure that your company adheres to the set security standards.

Final Thoughts

The cloud environment is highly dynamic. In recent times, the cloud-native landscape has evolved from Infrastructure-as-a-service to platform-as-a-service. Some of the tech innovations that support this evolution include managed databases, containerization, and serverless computing. These advancements pose new cloud security challenges for organizations. Businesses must stay abreast of the emerging security threats in this landscape and constantly upgrade their security response plans to secure their cloud-native applications. If your company is struggling to secure its cloud-native apps, applying the 8 strategies discussed above can reduce vulnerabilities and improve your response to security threats.

The post How to Secure Your Cloud Native Applications in 2024 appeared first on Tech Research Online.

]]>
https://techresearchonline.com/blog/cloud-native-applications/feed/ 0
What Is Artificial General Intelligence and How Does It Work? https://techresearchonline.com/blog/artificial-general-intelligence/ https://techresearchonline.com/blog/artificial-general-intelligence/#respond Wed, 20 Mar 2024 12:21:33 +0000 https://techresearchonline.com/?p=736555 Artificial General Intelligence (AGI) hasn’t become real yet. However, research into this type of artificial intelligence where machines think and learn as people continues in different parts of the world. The idea behind AGI is to have machines develop self-awareness and consciousness. These developments have already started manifesting in innovations like self-driving cars. Once developed fully, AGI can potentially blur the intellectual differences that currently exist between machines and humans. Although it’s still too early to tell whether machines can simulate human intellectual capabilities fully, the concept of AGI is fascinating. In this article, we explore AGI further to help you understand how it differs from artificial intelligence (AI) and the technologies behind it. What is Artificial General Intelligence? Artificial General Intelligence is a theoretical form of AI that can learn, understand, and apply knowledge to perform intellectual tasks like humans. Although AGI isn’t a reality yet, its design incorporates adaptability, flexibility, and problem-solving skills. These skills will enable it to perform any intellectual task that a human can, or in some instances, outperform human abilities. AGI is designed to address gaps in current AI systems. Currently, AI systems have limited scope. They cannot self-teach or complete tasks they are …

The post What Is Artificial General Intelligence and How Does It Work? appeared first on Tech Research Online.

]]>
Artificial General Intelligence (AGI) hasn’t become real yet. However, research into this type of artificial intelligence where machines think and learn as people continues in different parts of the world. The idea behind AGI is to have machines develop self-awareness and consciousness. These developments have already started manifesting in innovations like self-driving cars. Once developed fully, AGI can potentially blur the intellectual differences that currently exist between machines and humans.
Although it’s still too early to tell whether machines can simulate human intellectual capabilities fully, the concept of AGI is fascinating. In this article, we explore AGI further to help you understand how it differs from artificial intelligence (AI) and the technologies behind it.

What is Artificial General Intelligence?

Artificial General Intelligence is a theoretical form of AI that can learn, understand, and apply knowledge to perform intellectual tasks like humans. Although AGI isn’t a reality yet, its design incorporates adaptability, flexibility, and problem-solving skills. These skills will enable it to perform any intellectual task that a human can, or in some instances, outperform human abilities.
AGI is designed to address gaps in current AI systems. Currently, AI systems have limited scope. They cannot self-teach or complete tasks they are not trained to perform. AGI promises complete AI systems that utilize generalized human cognitive abilities to perform complex tasks across different domains. Artificial general intelligence examples already exist in self-driving cars.

Artificial General Intelligence vs Artificial Intelligence: What’s the Difference?

In decades past, computer scientists advanced machine intelligence to a point where machines perform specific tasks. For instance, AI text-to-speech tools use deep learning models to establish the link between linguistic elements and their acoustic features. These machine-learning models learn from huge volumes of audio and text data and then generate AI speech and voice patterns.
Today, AI systems are designed to perform specific tasks. They can’t be repurposed to work in other domains. Their computing algorithms and specifications are limited and they rely on real-time data for decision-making. This form of machine intelligence is considered narrow or weak AI.
AGI seeks to advance current AI capabilities. It seeks to diversify the tasks that machines can perform to enable them to solve problems in multiple domains instead of one. This makes AGI a hypothetical representation of a strong, full-fledged AI. Such AI will have general cognitive abilities that enable it to solve complex tasks, just like humans.

How Does General Artificial Intelligence Work?

The concept of AGI is based on the theory of mind that underpins the AI framework. This theory focuses on training machines to understand consciousness and learning as fundamental aspects of human behavior. Besides applying algorithms, AGI will incorporate logic into machine learning and AI processes to mirror human learning and development.
With a solid AI foundation, AGI is expected to learn cognitive abilities, make judgments, integrate learned knowledge in decision-making, manage uncertain situations, and even plan. General artificial intelligence will also facilitate machines to conduct imaginative, innovative, and creative tasks.

Technologies that Drive Artificial General Intelligence

The concept of AGI is still in the theoretical stage. Research on its viability and efforts to create AGI systems continue in different parts of the world. The following are the emerging technologies that will most likely characterize AGI:

1. Robotics

This is an engineering discipline that involves the creation of mechanical systems that automate physical tasks. In AGI, robotics facilitate the physical manifestation of machine intelligence. Robotics plays an important role in supporting the physical manipulation ability and sensory perception required by AGI systems.

2. Natural Language Processing

This AI branch enables machines to generate and understand human language. NLP systems convert language data into representations known as tokens using machine learning and computational linguistics.

3. Deep Learning

It’s an AI discipline that involves training multiple layers of neural networks to understand and extract complex relationships from raw data. Deep learning can be used to create systems that understand different types of information like audio, text, video, and images.

4. Computer Vision

A technology that supports extraction, analysis, and comprehension of spatial data from visual data. For instance, self-driving cars rely on computer vision models to analyze camera feeds in real time for safe navigation. Computer vision relies on deep learning technologies to automate object classification, recognition, and tracking among other image-processing tasks.

5. Generative AI

A subset of deep learning, this technology enables AI systems to generate realistic and unique content from knowledge learned. Generative AI models use huge datasets to train, which enables them to answer questions from humans in text, visuals, and audio formats that resemble natural human creations.

The Challenge Ahead

If it becomes a reality, there is no doubt artificial general intelligence will change how we work and live. But the journey to making it work isn’t smooth. In developing this emerging technology, computer scientists must find ways to make AGI models connect between domains the way humans do. Another challenge that needs to be overcome relates to emotional intelligence.
Neural networks cannot replicate the emotional thinking required to drive creativity and imagination. Humans respond to situations and conversations depending on how they feel. Considering the logic embedded in current AI models, replicating this ability and improving sensory perceptions to enable machines to respond and perceive the world the way humans do remains an uphill task.

The post What Is Artificial General Intelligence and How Does It Work? appeared first on Tech Research Online.

]]>
https://techresearchonline.com/blog/artificial-general-intelligence/feed/ 0
Distributed Ledger Technology: A Comprehensive Overview https://techresearchonline.com/blog/distributed-ledger-technology-overview/ https://techresearchonline.com/blog/distributed-ledger-technology-overview/#respond Tue, 13 Feb 2024 10:22:57 +0000 https://techresearchonline.com/?p=644518 If you’ve been following cryptocurrencies and blockchain, you’ve heard about distributed ledger technology (DLT). Although the idea of distributed computing isn’t entirely new, the execution of distributed ledgers is one of the most ingenious inventions of our time. Distributed ledgers didn’t gain popularity until 2008 when the first cryptocurrency was created. Since then, they have evolved into programmable and scalable platforms where tech solutions that use ledgers and databases can be created. In very simple terms, distributed ledger technology may be defined as tech protocols and infrastructure that allow concurrent access to records, updates, and validations across a network of databases. In this article, we explore the differences between DLTs and blockchain and explain their benefits and limitations. Distributed Ledger Technology vs Blockchain Blockchain is a form of distributed ledger technology. However, there are many other types of DLT systems. As decentralized systems, blockchains and DLTs facilitate transparent and secure data storage and updating. However, major differences exist between the two. DLT systems use different structures to manage and store data while blockchains use linear blocks to record, store, and verify transactions. Each block has transaction data, a time stamp, and a cryptographic hash for the previous block. The other …

The post Distributed Ledger Technology: A Comprehensive Overview appeared first on Tech Research Online.

]]>

If you’ve been following cryptocurrencies and blockchain, you’ve heard about distributed ledger technology (DLT). Although the idea of distributed computing isn’t entirely new, the execution of distributed ledgers is one of the most ingenious inventions of our time.

Distributed ledgers didn’t gain popularity until 2008 when the first cryptocurrency was created. Since then, they have evolved into programmable and scalable platforms where tech solutions that use ledgers and databases can be created.

In very simple terms, distributed ledger technology may be defined as tech protocols and infrastructure that allow concurrent access to records, updates, and validations across a network of databases. In this article, we explore the differences between DLTs and blockchain and explain their benefits and limitations.

Distributed Ledger Technology vs Blockchain

Blockchain is a form of distributed ledger technology. However, there are many other types of DLT systems. As decentralized systems, blockchains and DLTs facilitate transparent and secure data storage and updating. However, major differences exist between the two.
DLT systems use different structures to manage and store data while blockchains use linear blocks to record, store, and verify transactions. Each block has transaction data, a time stamp, and a cryptographic hash for the previous block.
The other difference between blockchains and DLT systems is immutability. Blockchain does not allow alteration of data after recording it on the chain. This isn’t the case with DLT systems. Although some DLTs offer immutability, this feature does not apply to all distributed ledgers.
Blockchains are mostly permissionless and public. However, some are permissioned. This is different for DLTs. The permissioned blockchains are designed to provide high levels of security and privacy. They can be made permissionless where need arises.
The two systems have wide applications. However, blockchains are often used in applications like smart contracts and cryptocurrencies. DLTs, on the other hand, are mostly associated with healthcare, supply chain management, and voting systems.

Benefits of Distributed Ledger Technology

Distributed ledger technological solutions are important because they have the potential to change how companies, governments, and other entities record, store, and distribute information. Their value is demonstrated by the range of benefits  they offer, which include: 

1. Eliminating  Fraud

There are no centralized points of control in distributed ledgers. This reduces their vulnerability to widespread system failures and enhances their resilience to cyberattacks. Some DLTs use cryptographic algorithms that make it impossible to forge or alter records. This feature makes DLT data trustworthy and reduces fraud risk.

2. Improving  Efficiency

Distributed ledgers automate transactions and eliminate intermediaries. Since they facilitate automatic execution of transactions upon fulfillment of contract conditions, DLTs reduce human interaction in transactions. This streamlines organizational processes, increases efficiency, and reduces costs for organizations. 

3. Immutability

Distributed ledgers allow users to make database entries without involving third-parties. Once records are entered into the ledgers, they cannot be altered. This means your records remain secure until the ledgers have been distributed. 

4. Decentralization

DLT systems are highly decentralized. They store data across database networks in an accurate and consistent manner, which helps in reducing discrepancies and errors. 

5. Greater Transparency

Distributed ledger technology enhances visibility of system operations for all users, which enhances transparency of transactions and data. With greater transparency, businesses, and governments enjoy stakeholder trust.  

Limitations of Distributed Ledger Technology 

Distributed ledgers have several limitations due to their infancy. These limitations include:

1. Complex Technology

Another limitation facing distributed ledgers is their complex technological nature. This complexity makes it challenging to maintain and implement. Businesses and governments that want to leverage DLT solutions must invest in specialized expertise. The technical complexity of DLTs also makes it challenging for developers to design new services and applications.

2. Lack of Regulatory Clarity

Regulation is among the major limitations of distributed ledger technologies. Across the world, governments struggle to regulate DLTs like blockchain. This lack of clarity in the regulatory environment causes confusion and uncertainty for business. Without clear regulation, distributed ledger solutions cannot reach their full potential. 

3. Slow Adoption

Distributed ledgers can only transform business operations through widespread adoption. However, awareness of how these technologies work remains low. Additionally, most people hesitate to try new technologies, which further slows down their adoption rate.

4. The Interoperability Challenge

Most DLT systems run independently without communicating with each other. This makes it impossible for users to move information or assets from one system to the other. Although there are efforts to fix this operation issue. But it’ll take time before such a solution is developed.

Conclusion

Although the adoption of distributed ledgers by businesses and governments appears slow, the technology leaves a lasting impact on entities and industries that utilize it. The technology has the potential to change the way businesses operate and manage data. DLTs are becoming a necessity for modern enterprises and governments that need to prevent fraud, fix inefficiencies, and guarantee accuracy of supply chain and financial reporting data.

They improve efficiency and offer transparency and better security.  However, these benefits are curtailed by the complexity of these technologies, unclear regulations, and slow adoption. As DLTs advance, these drawbacks will be addressed and the potential of these technologies realized.

The post Distributed Ledger Technology: A Comprehensive Overview appeared first on Tech Research Online.

]]>
https://techresearchonline.com/blog/distributed-ledger-technology-overview/feed/ 0
Tencent is Working on the Elden Ring Mobile Version: Reports https://techresearchonline.com/news/elden-ring-mobile-game-tencent-gaming-innovation/ https://techresearchonline.com/news/elden-ring-mobile-game-tencent-gaming-innovation/#respond Tue, 06 Feb 2024 14:19:52 +0000 https://techresearchonline.com/?p=605503 Elden Ring is one of the most successful games by FromSoftware Inc. According to anonymous sources, Elden Ring is getting a mobile version and the project was initiated in 2022. It was shortly after Tencent bought a 16% minority stake in FromSoftware. A recent report by Reuters mentioned that the company wants to keep Elden Ring Mobile as a free-to-play game with in-app purchases akin to HoYoverse’s Genshin Impact. A couple dozen developers are working on the prototype but the progress has been slow, maybe, due to the free-to-play factor. Tencent’s Chinese Rivalry These reports of Elden Ring mobile came out due to the competition Tencent is facing in China. This fierce competition is from Chinese competitors miHoYo and NetEase, developers of titles like Genshin Impact and Eggy Party. This is why the company is trying to create new hits. However, a bigger obstacle they have is transferring premium console games to mobile is easier said than done. Tencent’s chief executive and co-founder Pony Ma said during the company’s recent annual meeting in Shenzhen, “Gaming is our flagship business…But in the past year, we have faced significant challenges. We have found ourselves at a loss, as our competitors continue to …

The post Tencent is Working on the Elden Ring Mobile Version: Reports appeared first on Tech Research Online.

]]>
Elden Ring is one of the most successful games by FromSoftware Inc. According to anonymous sources, Elden Ring is getting a mobile version and the project was initiated in 2022. It was shortly after Tencent bought a 16% minority stake in FromSoftware.
A recent report by Reuters mentioned that the company wants to keep Elden Ring Mobile as a free-to-play game with in-app purchases akin to HoYoverse’s Genshin Impact. A couple dozen developers are working on the prototype but the progress has been slow, maybe, due to the free-to-play factor.

Tencent’s Chinese Rivalry

These reports of Elden Ring mobile came out due to the competition Tencent is facing in China. This fierce competition is from Chinese competitors miHoYo and NetEase, developers of titles like Genshin Impact and Eggy Party. This is why the company is trying to create new hits. However, a bigger obstacle they have is transferring premium console games to mobile is easier said than done.
Tencent’s chief executive and co-founder Pony Ma said during the company’s recent annual meeting in Shenzhen, “Gaming is our flagship business…But in the past year, we have faced significant challenges. We have found ourselves at a loss, as our competitors continue to produce new products, leaving us feeling having achieved nothing.” In response, Ma said, “Tencent is focusing on integrating its Hunyuan AI model into different parts of its business to increase efficiency.”

The IP Licensing Hiccup

Tencent got intellectual property licensing of Elden Ring mobile to develop free-to-play versions. This could be the latest in the long line of IP licenses they acquired. This is of course if the reports are accurate. The most successful mobile gaming were PUBG Mobile and Call of Duty: Mobile. These are not the only mobile games Tencent is working on, they are also working on mobile versions of Need for Speed and Assassin’s Creed.
Success is not guaranteed in the mobile versions of games and Tencent has proved it. In the previous year, they shut down the mobile version of Apex Legends which was created in collaboration with EA. Moreover, they also canceled a mobile game based on the Nier franchise over monetization concerns ( unannounced).

Concluding Thoughts

Tencent is putting in all the effort but mobile-based games like Elden Ring have the risk of failing more. So if it is successfully launched it will be a grand win for Tencent. Lastly, China’s approval system for video games can take months or years before it gives its approval. It can put any great game, even Elden Ring mobile, in jeopardy once they release it.

The post Tencent is Working on the Elden Ring Mobile Version: Reports appeared first on Tech Research Online.

]]>
https://techresearchonline.com/news/elden-ring-mobile-game-tencent-gaming-innovation/feed/ 0
AI Advancements in 2024: What to Expect? https://techresearchonline.com/blog/ai-advancements-in-2024/ https://techresearchonline.com/blog/ai-advancements-in-2024/#respond Thu, 04 Jan 2024 13:55:38 +0000 https://techresearchonline.com/?p=531157 AI in 2024 has been predicted to be finer than what it was in 2023. ChatGPT, Bard, and Copilot got tremendous updates to ensure they were optimum and user-friendly. Many enterprises recognized the importance of AI and how it impacted their decision-making. Moreover, tech giants invested heavily in AI startups to get ahead in the trend and keep up with the smooth functioning (Amazon to Compete in the AI Race With up to a $4 Billion Investment in Anthropic). However, governments across the globe paid serious attention to AI regulations to avoid exploitation(AI Regulation Meet: Top AI Firms to Visit the White House). So have we reached the top in the advancements in AI? Before answering that question let’s see the AI trends and news that went viral in 2023. 2023 in Review Starting from Pope’s image to Sam Altman getting fired from OpenAI, we have covered some of the biggest events that happened last year. A Chicago man in March 2023 created an AI-generated image of Pope wearing a white puffer jacket using the AI image generator Midjourney, showcasing how powerful AI is in deceiving humans. In March, Tech chiefs including Elon Musk and Steve Wozniak wrote an open …

The post AI Advancements in 2024: What to Expect? appeared first on Tech Research Online.

]]>
AI in 2024 has been predicted to be finer than what it was in 2023. ChatGPT, Bard, and Copilot got tremendous updates to ensure they were optimum and user-friendly. Many enterprises recognized the importance of AI and how it impacted their decision-making.
Moreover, tech giants invested heavily in AI startups to get ahead in the trend and keep up with the smooth functioning (Amazon to Compete in the AI Race With up to a $4 Billion Investment in Anthropic). However, governments across the globe paid serious attention to AI regulations to avoid exploitation(AI Regulation Meet: Top AI Firms to Visit the White House). So have we reached the top in the advancements in AI?
Before answering that question let’s see the AI trends and news that went viral in 2023.

2023 in Review

Starting from Pope’s image to Sam Altman getting fired from OpenAI, we have covered some of the biggest events that happened last year.
  • A Chicago man in March 2023 created an AI-generated image of Pope wearing a white puffer jacket using the AI image generator Midjourney, showcasing how powerful AI is in deceiving humans.
  • In March, Tech chiefs including Elon Musk and Steve Wozniak wrote an open letter requesting AI organizations to halt training for six months due to potential risks such as loss of civilization control, job destruction, and human annihilation.
  • Meta’s large language model, LLaMA, got leaked in the same month along with its weights, on 4Chan’s technology board and was available for download through torrents globally. This became a source of tools for the open-source community in the AI industry.
  • Since the launch of Bing Chat in February 2023, Microsoft kept bringing innovation. They introduced Copilot, a widespread application of AI. Microsoft integrated Copilot into Word, Teams, and Windows 11, automating tasks like image creation and meeting summarization, to highlight the capability of AI.
  • Reports suggested AI can take 300 million jobs if left in the dark. In addition to that, Hollywood authors went on strike over the use of AI in filmmaking. Moreover, writers in September filed a class action suit against AI organizations for using their works to teach their LLMs.
  • In November 2023, the OpenAI board fired CEO Sam Altman leading to resignations and chaos. However, Microsoft offered jobs to him and other employees who resigned. Altman was reinstated later and OpenAI got fresh board members.

5 Advancements To Look Forward in AI in 2024

AI advancements are continuous and we think more innovations are coming in AI in 2024. Let us take a look.

1. Businesses Will Incorporate AI Into More Products

In 2024, the growth of incorporating AI into products and services will accelerate. This is because of AI’s capability to enhance experience, decision-making, and automate tasks. It can drastically impact the data and analytics lifecycles. So most Big Data problems and data science projects will have efficiency.
AI in 2024 will be accessible for organizations as it will solve a complex problem of data quality checks with the help of augmented tools. With AI integration and automation, Business Intelligence tools will provide a more seamless and interactive experience, ensuring that users engage with data in a natural language interface.

2. Convergence of AI and IoT

When AI and IoT are infused into an organization, it brings scalability, security and privacy, synergism, and reliability. IoT is the network of physical devices, gadgets, sensors, appliances, and vehicles that are connected to the internet and can communicate with each other. Though it can collect a significant amount of data and analyze it, it also poses security threats.
This is why infusing IoT and AI in 2024 is ideal. AI can help IoT in processing and interpreting data with the help of techniques like Machine Learning, computer vision, natural language processing, and speech recognition. Moreover, AI can assist in creating new applications and services based on the data collected by IoT.

3. Combining AI and Cryptocurrency

Cryptocurrency is a type of digital currency designed to work as a medium of exchange through a computer network. It is not issued by a central authority like a government or bank but is based on a network of decentralized peer-to-peer transactions. In 2024, we will see AI and cryptocurrency combined which is known as AI Crypto.
It is paving new roads for users in the AI and crypto space. AI crypto will create a pattern of intelligence and systematic processes that can change various sectors and industries. With AI the transactions can be automated and users can have utmost security, without any third-party involvement.

4. A More Realistic and Higher Quality Generation

In 2023, we saw inclusivity and diversity in all sectors and industries but many AI organizations didn’t include them in their services. AI in 2024 will witness much more inclusivity and diversity. Most enterprises are trying to make it as realistic as possible for a higher user experience.
Transparency is another thing we can see in AI happening as many content creation and publishing websites use AI-generated content and don’t put a disclaimer for the same. This can be misleading and won’t provide accurate information to the people. So it is ideal that enterprises will practice diversity and transparency in 2024.

5. Enterprises Will Perform Responsible AI

In 2023, people around the world raised questions about AI harming students and employees. So many governments framed policies governing AI usage in 2023. It will be a noteworthy watch to see what changes will be made in AI in 2024 in these policies.
For enterprises, only the EU made AI Act and policies but by June 2024 two US states California and Colorado will adopt regulations addressing automated decision-making regarding consumer privacy. Enterprises will need to figure out the applicable laws and work according to them. While these regulations are for AI systems that are trained or collect personal information, both offer consumers the right to opt out of the use of these systems. So it will be significant to see enterprises navigate responsible AI.

On a Final Note

AI in 2024 will see some critical advancements and technological evolutions. In 2023, we didn’t reach the highest advancements but will reach new heights in 2024. It will increase productivity, efficiency, and scalability for people from all walks of life. Businesses have to adapt to many changes and keep bringing innovation to stay in the competition keeping the new AI regulations in mind. So the journey ahead may look rocky in the AI trends but it will make work, education, and other aspects simpler for users.

The post AI Advancements in 2024: What to Expect? appeared first on Tech Research Online.

]]>
https://techresearchonline.com/blog/ai-advancements-in-2024/feed/ 0
Top 10 Strategies to Ensure GDPR Compliance Across Industries https://techresearchonline.com/blog/gdpr-compliance-strategies/ https://techresearchonline.com/blog/gdpr-compliance-strategies/#respond Tue, 31 Oct 2023 10:14:55 +0000 https://techresearchonline.com/?p=409612 In May 2018, the General Data Protection Regulation (GDPR) took effect in the European Union. This law was enacted to curb widespread data breaches that exposed personal data, putting the security and trust of citizens at risk. With non-compliance fines exceeding €20 million, the GDPR is perhaps the most strict data privacy protection law in the world. GDPR provisions apply to all industries as long as a company collects and processes personal data from residents of the European Union. It gives EU residents control of their personal data. Companies that collect such data must do so in accordance with the regulations while respecting the right of data owners to control their data. They must also protect private data from exploitation, misuse, and compromise. 10 Strategies for Boosting GDPR Compliance in Every Industry Below are 10 easy strategies to help your company become GDPR-compliant in 2024: 1. Conduct a Personal Data Audit The first strategy that companies can use to ensure GDPR compliance across industries in 2024 is auditing the personal data. The audit should identify the nature of private data the companies hold, the source and who it’s shared with. GDPR regulations place responsibilities on companies to adhere to data …

The post Top 10 Strategies to Ensure GDPR Compliance Across Industries appeared first on Tech Research Online.

]]>
In May 2018, the General Data Protection Regulation (GDPR) took effect in the European Union. This law was enacted to curb widespread data breaches that exposed personal data, putting the security and trust of citizens at risk. With non-compliance fines exceeding €20 million, the GDPR is perhaps the most strict data privacy protection law in the world.
GDPR provisions apply to all industries as long as a company collects and processes personal data from residents of the European Union. It gives EU residents control of their personal data. Companies that collect such data must do so in accordance with the regulations while respecting the right of data owners to control their data. They must also protect private data from exploitation, misuse, and compromise.

10 Strategies for Boosting GDPR Compliance in Every Industry

Below are 10 easy strategies to help your company become GDPR-compliant in 2024:

1. Conduct a Personal Data Audit

The first strategy that companies can use to ensure GDPR compliance across industries in 2024 is auditing the personal data. The audit should identify the nature of private data the companies hold, the source and who it’s shared with.
GDPR regulations place responsibilities on companies to adhere to data protection principles that include putting in place effective procedures and policies. For example, companies must inform their partners of any data anomalies and inaccuracies they note in the data they share for purposes of making corrections.

2. Document Legal Reasons for Processing Personal Data

Another GDPR compliance strategy is to change corporate data privacy rights based on legal reasons for collecting and processing personal data. For instance, where companies use consent as their legal basis, regulators can demand deletion of the data. To avoid this, identifying and documenting legal reasons for collecting and processing personal data will be critical. Companies must also understand the different kinds of data processing they conduct.

3. Commission a Data Protection Impact Assessment

This assessment helps in identifying and mitigating risks relating to collection and processing of personal data. Understanding the gaps and risks enables you to craft relevant policies and take the right security measures.

4. Review the Privacy Policy

GDPR compliance requires companies to guarantee data owners or subjects of their personal data rights. In 2024, companies can review their privacy policies to ensure that website visitors and customers can:
  • Ask them to delete their personal data
  • Deny permission to process their data
  • Ask and receive all the details a company collect about them
  • Rectify and update inaccurate or incomplete information
  • Place restrictions on how the company uses their data
  • Get a copy of the personal data the company holds and stores
  • Ask for information on how the company uses their personal data

5. Review Consent Procedures

GDPR compliance requires companies to be more transparent in the way they collect, process and use personally identifiable information. In 2024, companies can comply with this requirement by reviewing their consent procedure. They can align their procedures to GDPR requirements by demonstrating that they:
  • Inform people about collection of personal data in advance
  • Give them a valid reason for collecting their data
  • Limit data collection to the specified reason
  • Seek consent to process data from data owners through opt-ins or check boxes
  • Specify the duration of data storage
  • Inform their audience of changes to the data collection process

6. Improve Data Security

Under the GDPR compliance requirements, the responsibility to protect private data from exploitation, misuse, and compromise lies with data collectors and processors. In 2024, companies can comply with this requirement by adopting better cybersecurity solutions. These include:
  • Protecting networks with VPNs, firewalls and layered approaches
  • Securing data through the use of up-to-date antivirus, data backups, encryptions, and tokenization
  • Implementing insider risk management tactics like monitoring employees, analyzing user and entity behavior and tracking third-party activities
  • Managing access controls through multi-factor authentication, identity management and private access

7. Get a Designated Data Protection Officer (DPO)

Another strategy that will ensure GDPR compliance in the business world is having a designated officer to handle data protection issues within companies. The DPO function can be outsourced or hired in-house to ensure a company complies with the IT requirements in the GDPR. The key roles of a DPO is to create awareness about GDPR requirements, support data protection impact assessments, monitor GDPR compliance, and report risks relating to data breach.

8. Document GDPR Compliance Procedures

Part of GDPR compliance is your ability to demonstrate adherence to the regulation and provide evidence that data processing complies to legal and security requirements. An effective way to do this is to document internal compliance processes, including how you secure personal data. Some of the essential documentation to include in your documentation are:
  • Details of data protection officer and controllers
  • Descriptions of the administrative and technical data security measures you implement
  • Flow of data in your company
  • Results of the data protection impact assessment

9. Set Up Data Breach Procedures

Personal data breaches like identity theft that are likely to harm data subjects must be reported as soon as they occur. This GDPR requirement means that companies must establish clear processes of detecting, reporting and probing data breaches. It’s important to note that failing to report data breaches can attract multiple fines under the GDPR.

10. Create GDPR Awareness

Sensitize employees and decision makers about GDPR regulations and data security practices. This awareness can enhance their cooperation and mobilize resources (financial, human resources, and technical) necessary for GDPR compliance. It would also help them to understand the impact of non-compliance to the company.

Conclusion

For many companies, complying with the GDPR can feel overwhelming. But this doesn’t have to be the case. Legal adherence can become easier for your company if you focus on implementing the GDPR compliance practices and strategies discussed above.

The post Top 10 Strategies to Ensure GDPR Compliance Across Industries appeared first on Tech Research Online.

]]>
https://techresearchonline.com/blog/gdpr-compliance-strategies/feed/ 0
Australia Fines X for Not Addressing Questions on Child Abuse Content https://techresearchonline.com/news/australia-fines-x/ https://techresearchonline.com/news/australia-fines-x/#respond Mon, 16 Oct 2023 12:43:26 +0000 https://techresearchonline.com/?p=406724 On Sunday 15 October, Australia’s eSafety commissioner fined X, formerly known as Twitter. The penalty is 610,500 AUD which is $380,000 US dollars for not disclosing how it polices child abuse content. X has 28 days to respond to or pay the fine. Commissioner Julie Inman Grant said in a statement, “Twitter/X has stated publicly that tackling child sexual exploitation is the number 1 priority for the company, but it can’t just be empty talk, we need to see words backed up with tangible action.” Australia’s Protection Against Online Child Abuse Australia penalized X as per the Online Safety Act, introduced in 2021. The Law requires online service providers to report how they handle child abuse content on their platforms. Moreover, a civil penalty can be imposed on the companies failing to meet the reporting requirement. A legal memo was sent to X in February by Australia’s eSafety office along with other tech companies like Google, TikTok, Twitch, and Discord. The notice included several serious questions for the companies to address regarding how they handle child exploitation content. As per the eSafety commissioner, X didn’t answer many of the questions and left ‘some sections entirely blank.’ Furthermore, X was not …

The post Australia Fines X for Not Addressing Questions on Child Abuse Content appeared first on Tech Research Online.

]]>
On Sunday 15 October, Australia’s eSafety commissioner fined X, formerly known as Twitter. The penalty is 610,500 AUD which is $380,000 US dollars for not disclosing how it polices child abuse content. X has 28 days to respond to or pay the fine.
Commissioner Julie Inman Grant said in a statement, “Twitter/X has stated publicly that tackling child sexual exploitation is the number 1 priority for the company, but it can’t just be empty talk, we need to see words backed up with tangible action.”

Australia’s Protection Against Online Child Abuse

Australia penalized X as per the Online Safety Act, introduced in 2021. The Law requires online service providers to report how they handle child abuse content on their platforms. Moreover, a civil penalty can be imposed on the companies failing to meet the reporting requirement.
A legal memo was sent to X in February by Australia’s eSafety office along with other tech companies like Google, TikTok, Twitch, and Discord. The notice included several serious questions for the companies to address regarding how they handle child exploitation content.
As per the eSafety commissioner, X didn’t answer many of the questions and left ‘some sections entirely blank.’ Furthermore, X was not the only social media platform the eSafety office took issue with. They said they found ‘serious shortfalls’ in how child exploitation content is policed in five other platforms they filed legal notices to.
The office also mentioned that Google was issued a formal warning for providing ‘generic responses to specific questions.’ Google regional director Lucinda Longcroft said in a statement, “Protecting children on our platforms is the most important work we do. Since our earliest days, we have invested heavily in the industrywide fight to stop the spread of child sexual abuse material.”
However, as per the commissioner, “ X received an official fine because its failure to comply with Australia’s reporting standards was more egregious.” For instance, the company did not provide adequate information on how long it takes to respond to child abuse reports. Also, how long it takes to distinguish child sexual exploitation on its platform, and how many safety and public policy employees it has.
Also, in December 2022, NBC News and CNBC collected internal records showing that 25 employees held tags related to ‘Trust and Safety’ out of roughly 1600 employees who were employed at that time.

X’s Response to the News

Last year, Musk stated that removing child exploitation is priority #1. But when the commissioner asked X how the service prevented child grooming. The company said that it was ‘not a service used by large numbers of young people.’ The company also added that their available anti-grooming technology was ‘not sufficiently capable or accurate for deployment on Twitter.’
The question remains if X will respond to these questions with proper answers or if he will choose to pay the fines imposed. As it is relatively a small fine given the multibillion-dollar business that the platform holds now that it charges X users a small fee.

The post Australia Fines X for Not Addressing Questions on Child Abuse Content appeared first on Tech Research Online.

]]>
https://techresearchonline.com/news/australia-fines-x/feed/ 0
Rising Concerns and the Israel-Palestine War Impact on Economy https://techresearchonline.com/news/israel-palestine-war-impact-on-economy/ https://techresearchonline.com/news/israel-palestine-war-impact-on-economy/#respond Tue, 10 Oct 2023 12:53:29 +0000 https://techresearchonline.com/?p=404753 With the Israel-Palestine war, industries all around the world are suffering from losses and threats. Nations are facing cybersecurity issues, investors are panicking about stocks, and tech companies are struggling with the spread of misinformation. One instance of it is social media platform X, formerly known as Twitter. X updated its policies to combat hate speech and videos posted and shared on the platform. The video had content of violence faced by Israel and Palestine which killed hundreds of civilians in both nations in the last few days. This isn’t just limited to violence but also extends to false and misinformation with the Israel-Palestine war’s impact on the economy being significant. Tech Companies Stumble As Falsehoods Spread The speed at which false information and news went online after the recent attack on Israel is concerning. Tech platforms like Meta and X are struggling to fight this spread of misinformation. The lack of content moderation policies, layoffs, and cost reduction have restricted the platforms’ ability to solve the issue effectively. This false scenario was made by fake accounts impersonating journalists and war-themed video games surfacing around the Israel-Palestine conflict. Social media users are bombed with fake combat photos and old videos …

The post Rising Concerns and the Israel-Palestine War Impact on Economy appeared first on Tech Research Online.

]]>
With the Israel-Palestine war, industries all around the world are suffering from losses and threats. Nations are facing cybersecurity issues, investors are panicking about stocks, and tech companies are struggling with the spread of misinformation.
One instance of it is social media platform X, formerly known as Twitter. X updated its policies to combat hate speech and videos posted and shared on the platform. The video had content of violence faced by Israel and Palestine which killed hundreds of civilians in both nations in the last few days.
This isn’t just limited to violence but also extends to false and misinformation with the Israel-Palestine war’s impact on the economy being significant.

Tech Companies Stumble As Falsehoods Spread

The speed at which false information and news went online after the recent attack on Israel is concerning. Tech platforms like Meta and X are struggling to fight this spread of misinformation. The lack of content moderation policies, layoffs, and cost reduction have restricted the platforms’ ability to solve the issue effectively.
This false scenario was made by fake accounts impersonating journalists and war-themed video games surfacing around the Israel-Palestine conflict. Social media users are bombed with fake combat photos and old videos from Syria to look like they were taken in Gaza.
Andy Carvin, from the Atlantic Council’s Digital Forensic Research Lab, told AFP, “Social media platforms are struggling to keep up with the constant churn of misinformation and incitements to violence.”

Cyber Threats Increase With the War

Two days back, the Jerusalem Post, Israel’s news agency, was hacked into. Its official X handle said that the website crashed ‘due to a series of cyberattacks.’ The Israel-Palestine war is likely to spread in cyberspace as experts have warned of multiple instances of intelligence hacking and grid disruption that would affect allied nations on both sides. Cyber warfare consultants said that Dark web assaults may also be carried out for commercial gains while the world may see increasing malware attacks.
Siddharth Vishwanath, an emerging business leader at PwC told Livemint, “Israel has one of the most advanced security systems in the world. The Hamas attack on Israel perhaps means there may also have been a tech hack to suppress intelligence gathering and alerts. It is escalating in the physical world, and it is likely to escalate into a full-blown cyber warfare.”

Volatility in the Stock and Oil Markets

US and European stocks fell on Monday after investors reacted to the war between Palestine and Israel. The US stocks made a comeback by afternoon in the trading session. The Dow Jones rose 197 points or 0.6%, the S&P 500 added 0.6% and the Nasdaq Composite rose 0.4%.

David Donabedian, chief investment officer at CIBC Private Wealth US told CNN, “Right now there are a lot of ‘maybes’ and ‘ifs’ — and a real lack of clarity. Markets will continue to look at everything it usually looks at including climbing bond yields and the Federal Reserve’s future monetary policy decisions.”
The European stocks that fell in the morning stabilized a bit in the afternoon with France’s CAC 40 index falling 0.6%, while Germany’s DAX index dipped 0.7%. London’s FTSE 100 inched up 0.03%, propped up by gains in the shares of oil companies.
The price of oil also faced major changes as US oil prices settled at $86.38 a barrel, while Brent crude futures climbed to $88.15 a barrel.

Final Words

The question right now is whether the impact of the war on all aforementioned issues will conclude or go on to impact other industries and regions. The situation is still volatile and so are the stock and oil markets.

The post Rising Concerns and the Israel-Palestine War Impact on Economy appeared first on Tech Research Online.

]]>
https://techresearchonline.com/news/israel-palestine-war-impact-on-economy/feed/ 0
You Can Now Use the DALL-E 3 AI Image Generator in Microsoft Bing https://techresearchonline.com/news/dall-e-3-ai-image-generator-on-microsoft-bing/ https://techresearchonline.com/news/dall-e-3-ai-image-generator-on-microsoft-bing/#respond Wed, 04 Oct 2023 12:39:22 +0000 https://techresearchonline.com/?p=404598 On Tuesday, October 3rd, Microsoft announced that OpenAI’s latest model DALL-E 3 is now available to all Bing users. The feature was out over the last week, first for the Bing Enterprise users and then for Bing Image Creator. Now it is open for all Bing users to enjoy. The tech giant in its blog post said, “We’re excited to share that DALL-E 3, the latest and most capable text-to-image model from OpenAI, is now generally available to everyone within Bing Chat and Bing.com/create—for free!” Moreover, Bing is getting DALL-E 3 access way before OpenAI’s ChatGPT, bringing an advantage to Microsoft. The tech giant is likely to be the most popular image-generating tool for a long while. The Significance of DALL-E 3 It is the third version of OpenAI’s image-generating model powered by a neural network. It can generate realistic and distinct images from a natural language prompt. DALL-E 3 understands the user’s prompt with much more precision and reliability than the previous models. Furthermore, this version produces images that are photorealistic meaning they are not just visually attractive but are backed by logic. Microsoft has also attempted to design it in a way that is easier to use. It …

The post You Can Now Use the DALL-E 3 AI Image Generator in Microsoft Bing appeared first on Tech Research Online.

]]>
On Tuesday, October 3rd, Microsoft announced that OpenAI’s latest model DALL-E 3 is now available to all Bing users. The feature was out over the last week, first for the Bing Enterprise users and then for Bing Image Creator. Now it is open for all Bing users to enjoy.
The tech giant in its blog post said, “We’re excited to share that DALL-E 3, the latest and most capable text-to-image model from OpenAI, is now generally available to everyone within Bing Chat and Bing.com/create—for free!”
Moreover, Bing is getting DALL-E 3 access way before OpenAI’s ChatGPT, bringing an advantage to Microsoft. The tech giant is likely to be the most popular image-generating tool for a long while.

The Significance of DALL-E 3

It is the third version of OpenAI’s image-generating model powered by a neural network. It can generate realistic and distinct images from a natural language prompt. DALL-E 3 understands the user’s prompt with much more precision and reliability than the previous models. Furthermore, this version produces images that are photorealistic meaning they are not just visually attractive but are backed by logic.
Microsoft has also attempted to design it in a way that is easier to use. It has integrated DALL-E 3 into Bing and ChatGPT instead of making a standalone product. This will make it convenient for users to create and improvise their images by conversing with the chatbot rather than trying to improve their initial attempt.

Microsoft Ensuring the Safety and Ethics

In the blog post, they mentioned the risks and challenges associated with synthetic media and have taken appropriate steps to ensure it. Microsoft has created a content moderation system of its own which enables it to avoid creating images that contain nudity, violence, hate speech, or illegal activities.
In Bing Image Creator, all AI-generated images will possess a watermark complying with the C2PA specification. This watermark will include the time and date of its creation and confirm the source of the image as AI-generated.
Since the launch of Bing Image Creator, users have generated one billion images. No wonder why the servers will be overloaded for a while.
Microsoft’s Mikhail Parakhin posted— we know the DALL-E 3.0 generation right now is taking longer than normal. We expected some strong interest, but we didn’t expect THAT much, especially given it’s a weekend. Bringing more GPUs in will be better soon.
What images will you be generating through Bing Chat and Image Creator? Let us know in the comments.

The post You Can Now Use the DALL-E 3 AI Image Generator in Microsoft Bing appeared first on Tech Research Online.

]]>
https://techresearchonline.com/news/dall-e-3-ai-image-generator-on-microsoft-bing/feed/ 0